Skip to main content

Shmoocon 2015

Shmoocon

DIFFERENT - ShmooCon is an annual east coast hacker convention hell-bent on offering three days of an interesting atmosphere for demonstrating technology exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues. The first day is a single track of speed talks called One Track Mind. The next two days bring three tracks: Build It, Belay It and Bring It On.

AFFORDABLE - ShmooCon is about high quality without the high price. Keep in mind that space is limited, and we've sold out quickly every year.

ACCESSIBLE - ShmooCon is held in Washington, DC at the Washington Hilton about four blocks from the DC Metro's Dupont Circle Station. Fly into DCA, IAD or BWI or take a train to Union Station, and you're just a short cab ride away from the con.

ENTERTAINING - Brain melting from all the cool tech you're learning? Be sure to check out the other events running during ShmooCon, including the Lockpick Village, ShmooCon Labs, Hack Fortress and more.

ShmooCon supports the free and open exchange of information. We are proud to have attendees with unique and diverse viewpoints on just about any topic. We want to foster the exchange of ideas among attendees and think the community benefits from inclusiveness. To that end, we are committed to providing a friendly, lively, and welcoming environment for all. For your part, please be awesome to one another.

What is awesome? In the most simplest terms it means tolerance and respect. As much as we value free speech we also value our attendees and desire no one to be marginalized or intimidated. Everyone is welcome at ShmooCon.

If someone is not being awesome to you or you see someone not being awesome, please tell a staff member. If you yourself are not being awesome, be aware that you may be asked to leave the conference and no refund will be given.

Friday, January 16, 2015
Time One Track Mind
1200 Registration Opens
1430
Opening Remarks, Rumblings, and Rants

Bruce Potter

1530
Five Not-Totally-Crazy Ways to Build for Usability

Elissa Shevinsky

1600
Simple Windows Application Whitelisting Evasion

Casey Smith

1630
Don't Look Now! Malicious Image Spam

Kathy Liszka

1700
Userland Persistence on Mac OS X "It Just Works"

Joshua Pitts

1730
SEWiFi: Building a Security Enhanced WiFi Dongle

Ryan Holeman

1800
Betting BIOS Bugs Won't Bite Y'er Butt?

Xeno Kovah and Corey Kallenberg

1830

Keynote Address

Joseph Lorenzo Hall

2000 Infosec Family FUD

Saturday, January 17, 2015
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
NSA Playset: USB Tools

Dominic Spill, Michael Ossmann, and Jared Boone


Cockroach Analysis: A Statistical Analysis of the Flash and Java Files that Infest the Internet

David Dorsey


Where the Wild Things Are: Encryption, Police Access & the User

Whitney Merrill

1100
Knock Knock: A Survey of iOS Authentication Methods

David Schuetz


Understanding a New Memory Corruption Defense: Use-after-Free (UaF) Mitigation and Bypass

Jared DeMott


Analysis of POS Malware

Brandon Benson

1200
httpscreenshot - A Tool for Both Teams

Steve Breen and Justin Kennedy


There's Waldo! Tracking Users via Mobile Apps

Colby Moore and Patrick Wardle


Quantum Computing 01100101

Tess Schrodinger

1300 Lunch Break
1400
Automated Binary Analysis with Pin and Python

Omar Ahmed and Tyler Bohan


Practical Machine Learning for Network Security

Terry Nelms


Come to the Dark Side--We Have (Misfortune) Cookies

Lior Oppenheim and Shahar Tal

1500
NaCl: A New Crypto Library

Daniel J. Bernstein and Tanja Lange


The Joy Of Intelligent Proactive Security

Scott Behrens and Andy Hoernecke


Deception for the Cyber Defender: To Err is Human; to Deceive, Divine

Tom Cross, David Raymond, and Gregory Conti

1600
Tap On, Tap Off: Onscreen Keyboards and Mobile Password Entry

Kristen K. Greene, Joshua Franklin, and John Kelsey


Manually Searching Advisories and Blogs for Threat Data--"Who's Got Time for That?"

Elvis Hovor and Shimon Modi


Rethinking Security's Role in Computer Science Education

Sarah Zatko

1700
0wn the Con

The Shmoo Group


The Windows Sandbox Paradox

James Forshaw


Ask the EFF

Kurt Opsahl and Nate Cardozo

1800 Golden Flag Awards
1830 Fire Talks
2100 Saturday Night Party @ The Washington Hilton

Sunday, January 18, 2015
Time Build It! Belay It! Bring it On!
0930 Registration Opens
1000
White is the New Black: Why White Data Really Matters

Irena Damsky


No Budget Threat Intelligence: Tracking Malware Campaigns on the Cheap

Andrew Morris


Crypto Without Computers

Ben Agre

1100
Eliminating Timing Side-channels. A Tutorial.

Peter Schwabe


Infrastructure Tracking with Passive Monitoring and Active Probing

Anthony Kasza and Dhia Mahjoub


Mascots, March Madness & #yogapants: Hacking Goes to College

Chris Cullison, Zack Allen, and Avi Rubin

1200
The Dark Art of Data Visualization

David Pisano


Micronesia: Sub-kernel Kit for Host Introspection in Determining Insider Threat

Loc Nguyen


How Random is Your RNG?

Meltem Sˆnmez Turan, John Kelsey, and Kerry McKay

1300

Closing Plenary

Get Off My Lawn: Examining Change through the Eyes of The Old Guard

Bruce Potter (moderator), Carole Fennelly, Rick Forno, Ben Laurie, and Space Rogue

1400 Closing Remarks

48
RESULTS
rss


PART OF
Shmoocon
Hacker Conferences
Media Type
41
movies
7
texts
Year
1
2015
Collection
Creator
1
meltem sönmez turan, john kelsey, kerry mckay
1
the shmoo group
Language
48
English
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon 2015
movies
eye 9,338
favorite 0
comment 0
NSA USB Playset [SC2015]
Shmoocon 2015
movies
eye 4,652
favorite 0
comment 0
Knock Knock [SC2015]
Shmoocon 2015
movies
eye 394
favorite 0
comment 0
College Hacking [SC2015]
Shmoocon 2015
by Meltem Sönmez Turan, John Kelsey, Kerry McKay
movies
eye 289
favorite 0
comment 0
How Random Is Your RNG [SC2015]
Shmoocon 2015
movies
eye 267
favorite 0
comment 0
Where The Wild Things Are [SC2015]
Shmoocon 2015
movies
eye 230
favorite 0
comment 0
Quantum Computing [SC2015]
Shmoocon 2015
movies
eye 224
favorite 0
comment 0
Analyzing POS Malware [SC2015]
Shmoocon 2015
movies
eye 212
favorite 0
comment 0
The Joy of Intelligent Proactive Security [SC2015]
Shmoocon 2015
movies
eye 195
favorite 0
comment 0
NaCl Crypto Library [SC2015]
Shmoocon 2015
movies
eye 185
favorite 0
comment 0
Practical Machine Learning for Network Security [SC2015]
Shmoocon 2015
movies
eye 171
favorite 0
comment 0
Windows Sandbox Paradox [SC2015]
Shmoocon 2015
movies
eye 168
favorite 0
comment 0
Dark Art of Data Visualization [SC2015]
Shmoocon 2015
movies
eye 165
favorite 0
comment 0
httpscreenshot [SC2015]
Shmoocon 2015
movies
eye 157
favorite 0
comment 0
White is the New Black [SC2015]
Shmoocon 2015
movies
eye 149
favorite 0
comment 0
Automated Binary Analysis with Pin and Python [SC2015]
Shmoocon 2015
movies
eye 148
favorite 0
comment 0
Whitelisting Evasion [SC2015]
Shmoocon 2015
movies
eye 142
favorite 0
comment 0
Come to the Dark Side [SC2015]
Shmoocon 2015
movies
eye 136
favorite 0
comment 0
No Budget Threat Intel [SC2015]
Shmoocon 2015
movies
eye 129
favorite 0
comment 0
SEWIFI [SC2015]
Shmoocon 2015
movies
eye 126
favorite 0
comment 0
Deception for the Cyber Defender [SC2015]
Shmoocon 2015
movies
eye 123
favorite 0
comment 0
BIOS Bugs [SC2015]
Shmoocon 2015
movies
eye 118
favorite 0
comment 0
Wheres Waldo [SC2015]
Shmoocon 2015
movies
eye 112
favorite 0
comment 0
Manually Searching Advisories and Blogs for Threat Data [SC2015]
Shmoocon 2015
by The Shmoo Group
movies
eye 109
favorite 0
comment 0
For ten years we've chosen to stand up and share all the ins and outs and inner workings of the con. Why stop now? Join us to get the break down of budget, an insight to the CFP process, a breakdown of the hours it takes to put on a con like ShmooCon and anything thing else you might want to talk about. This is an informative, fast paced and generally fun session as Bruce dances on stage, and Heidi tries to hide from the mic. Seriously though--if you ever wanted to know How, When, or Why when...
Shmoocon 2015
movies
eye 109
favorite 0
comment 0
Infrastructure Tracking [SC2015]
Shmoocon 2015
movies
eye 109
favorite 0
comment 0
Crypto [SC2015]
Shmoocon 2015
movies
eye 102
favorite 0
comment 0
Malicious Image Spam [SC2015]
Shmoocon 2015
movies
eye 98
favorite 0
comment 0
Get off my lawn [SC2015]
Shmoocon 2015
movies
eye 97
favorite 0
comment 0
Cockroach Analysis [SC2015]
Shmoocon 2015
movies
eye 96
favorite 0
comment 0
Keynote [SC2015]
Shmoocon 2015
movies
eye 96
favorite 0
comment 0
Understanding a New Memory Corruption Defense [SC2015]
Shmoocon 2015
movies
eye 93
favorite 0
comment 0
Userland Persistance [SC2015]
Shmoocon 2015
movies
eye 88
favorite 0
comment 0
Tap On Tap Off [SC2015]
Shmoocon 2015
texts
eye 88
favorite 0
comment 0
Where the Wild Things Are Whitney Merrill
Shmoocon 2015
movies
eye 83
favorite 0
comment 0
Micronesia [SC2015]
Shmoocon 2015
movies
eye 80
favorite 0
comment 0
Eliminating Timing Side Channel Attacks [SC2015]
Shmoocon 2015
movies
eye 76
favorite 0
comment 0
Rethinking Securitys Role in CompSci Edu [SC2015]
Shmoocon 2015
movies
eye 66
favorite 0
comment 0
Opening Rants [SC2015]
Shmoocon 2015
movies
eye 66
favorite 0
comment 0
Ask EFF [SC2015]
Shmoocon 2015
movies
eye 63
favorite 0
comment 0
5 Usability [SC2015]
Shmoocon 2015
movies
eye 61
favorite 0
comment 0
Closing Remarks [SC2015]
Shmoocon 2015
texts
eye 60
favorite 0
comment 0
Don'tLookNow MaliciousImageSpam
Shmoocon 2015
texts
eye 57
favorite 0
comment 0
Greene Franklin Kelsey ShmooCon2015
Shmoocon 2015
texts
eye 54
favorite 0
comment 0
TerryNelms Practical Mach Learn Shmoocon 2015
Shmoocon 2015
movies
eye 53
favorite 0
comment 0
Saturday Firetalks [SC2015]
Shmoocon 2015
texts
eye 51
favorite 0
comment 0
KnockKnock iOS AuthSurvey ShmooCon 2015
Shmoocon 2015
texts
eye 33
favorite 0
comment 0
RethinkingSecuritysRoleShmooconPublic.pptx
Shmoocon 2015
texts
eye 28
favorite 0
comment 0
The Joy of Proactive Security slides.key